Filters








1,329 Hits in 3.7 sec

Eavesdropper Selection Strategies in Wireless Source Localization Networks

Cuneyd Ozturk, Sinan Gezici
2020 ICC 2020 - 2020 IEEE International Conference on Communications (ICC)  
We consider a wireless source localization network in which eavesdropper nodes aim to estimate the position of a target node.  ...  Moreover, in the presence of parameter uncertainty, a robust version of the eavesdropper selection problem is investigated.  ...  Wireless localization networks are commonly classified as self localization and source (network centric) localization networks [1] .  ... 
doi:10.1109/icc40277.2020.9148683 dblp:conf/icc/OzturkG20 fatcat:n7qa2yhcv5cghcufi4jf4hc254

Physical layer security in wireless cooperative relay networks: state of the art and beyond

Leonardo Jimenez Rodriguez, Nghi H. Tran, Trung Q. Duong, Tho Le-Ngoc, Maged Elkashlan, Sachin Shetty
2015 IEEE Communications Magazine  
AbstrAct Cooperative relaying is an effective method of increasing the range and reliability of wireless networks, and several relaying strategies have been adopted in major wireless standards.  ...  a wireless relay network.  ... 
doi:10.1109/mcom.2015.7355563 fatcat:zrm5ljkzk5gphpngvmndn3v4hq

A Survey of Optimization Approaches for Wireless Physical Layer Security [article]

Dong Wang, Bo Bai, Wenbo Zhao, Zhu Han
2019 arXiv   pre-print
Due to the malicious attacks in wireless networks, physical layer security has attracted increasing concerns from both academia and industry.  ...  Because of its importance in security designs, the latter research direction is surveyed in a comprehensive way in this paper.  ...  In [269] , hybrid full-/half-duplex receiver deployment strategies are proposed for wireless ad hoc networks to optimize the network-wide secrecy throughput and network-wide secure EE, respectively.  ... 
arXiv:1901.07955v1 fatcat:3pb27rlc45c3dmnjgwmjyspvb4

Eavesdropper and Jammer Selection in Wireless Source Localization Networks

Cuneyd Ozturk, Sinan Gezici
2021 IEEE Transactions on Signal Processing  
We consider a wireless source localization network in which a target node emits localization signals that are used by anchor nodes to estimate the target node position.  ...  Then, the problem of jammer selection is proposed where the aim is to optimally place a given number of jammer nodes to a subset of possible positions for degrading the localization accuracy of the network  ...  In this paper, the focus is on eavesdropping and jamming attacks in wireless source localization networks.  ... 
doi:10.1109/tsp.2021.3098465 fatcat:zycjp7gpanbihhsgkgk7ttrhvi

Wireless Network Intrinsic Secrecy

Alberto Rabbachin, Andrea Conti, Moe Z. Win
2015 IEEE/ACM Transactions on Networking  
We further propose strategies that mitigate eavesdropping capabilities, and we quantify their benefits in terms of network secrecy metrics.  ...  This research provides insights into the essence of wireless network intrinsic secrecy and offers a new perspective on the role of network interference in communication confidentiality. 1 For a discrete  ...  The generation of secret keys at the physical layer using common sources, such as reciprocal wireless channels, is addressed in [29] - [33] .  ... 
doi:10.1109/tnet.2013.2297339 fatcat:zbx4agyedvhbdpg25fmmqbdyse

Time Orient Trust Based Hook Selection Algorithm for Efficient Location Protection in Wireless Sensor Networks Using Frequency Measures

D Prasanna, R Santhosh
2018 International Journal of Engineering & Technology  
The dynamic changing of hook point reduces the impact of heavy Eavesdroppers and improves the QoS of the network.  ...  The method handles both source and sinks privacy by selecting random hook points around the region.  ...  Preserving Source-Location Privacy in Wireless Sensor Networks [3], presented an location protection approach to maintain privacy of source location in both local and global level.  ... 
doi:10.14419/ijet.v7i3.27.17966 fatcat:yu2sjiskozegbh57ismeoalpd4

Physical layer security from inter-session interference in large wireless networks

Azadeh Sheikholeslami, Dennis Goeckel, Hossein Pishro-Nik, Don Towsley
2012 2012 Proceedings IEEE INFOCOM  
Physical layer secrecy in wireless networks in the presence of eavesdroppers of unknown location is considered.  ...  In each case, we derive an achievable number of eavesdroppers that can be present in the region while secure communication between all sources and intended destinations is ensured.  ...  In this paper, we consider a cooperative strategy to improve physical layer secrecy in large wireless networks with a large number of sources, destinations, relay nodes and eavesdroppers.  ... 
doi:10.1109/infcom.2012.6195477 dblp:conf/infocom/SheikholeslamiGPT12 fatcat:ka36zeh5erdkzjkreoxegzjdve

Toward an analytical approach to anonymous wireless networking

Parv Venkitasubramaniam, Ting He, Lang Tong, Stephen Wicker
2008 IEEE Communications Magazine  
It is easy to see that this forwarding strategy would result in the transmission schedules of the source nodes and relay ABSTRACT Communications in a wireless network are susceptible to unauthorized traffic  ...  For example, by merely correlating packet transmission times of different nodes, a passive eavesdropper can decipher source-destination pairs and paths of traffic flow in a network.  ... 
doi:10.1109/mcom.2008.4473096 fatcat:yxt7cqc6m5gejeurwh57q4zjjq

Incremental relay selection with reduced power consumption and jamming for secure cooperative networks

2017 Revista Técnica de la Facultad de Ingeniería Universidad del Zulia  
This paper shows the cooperative transmission for securing a decode-and-forward (DF) two-hop network where multiple cooperative nodes coexist with a potential eavesdropper.  ...  Under the more practical assumption that only the channel distribution information (CDI) of the eavesdropper is known, this paper proposes an incremental relaying with artificial jamming and beam forming  ...  Relay selection is done by source node and broadcast to all other nodes. From the CDI of eavesdropper source calculate SNR and ESR to improve secrecy.  ... 
doi:10.21311/001.39.10.02 fatcat:5baqwmovm5hctexhz5wkzqpon4

Throughput Anonymity Trade-off in Wireless Networks under Latency Constraints

P. Venkitasubramaniam, L. Tong
2008 2008 Proceedings IEEE INFOCOM - The 27th Conference on Computer Communications  
Providing anonymity to routes in a wireless ad hoc network from passive eavesdroppers is considered.  ...  Using Shannon's equivocation as an information theoretic measure of anonymity, scheduling strategies are designed for wireless nodes using receiver directed signaling.  ...  COVERT RELAY SELECTION Using the characterized rate regions in Sections III-A and III-B, we now proceed to design the strategy to select relays in each session to be covert.  ... 
doi:10.1109/infocom.2007.57 fatcat:7rewwxt5ffgbdaurppe67ruvf4

Throughput Anonymity Trade-off in Wireless Networks under Latency Constraints

P. Venkitasubramaniam, L. Tong
2008 IEEE INFOCOM 2008 - The 27th Conference on Computer Communications  
Providing anonymity to routes in a wireless ad hoc network from passive eavesdroppers is considered.  ...  Using Shannon's equivocation as an information theoretic measure of anonymity, scheduling strategies are designed for wireless nodes using receiver directed signaling.  ...  COVERT RELAY SELECTION Using the characterized rate regions in Sections III-A and III-B, we now proceed to design the strategy to select relays in each session to be covert.  ... 
doi:10.1109/infocom.2008.57 dblp:conf/infocom/VenkitasubramaniamT08 fatcat:v5tpaawicrbolm6lgymq377ecu

Secure and Energy-Efficient Data Collection in Wireless Sensor Networks

Anfeng Liu, Laurence T. Yang, Motoki Sakai, Mianxiong Dong
2013 International Journal of Distributed Sensor Networks  
In "An energy-efficient cyclic diversionary routing strategy against global eavesdroppers in wireless sensor networks" by J.  ...  Secure localization Hierarchical sensor network security positioning [7], lightweight security localization method [8].  ...  have been published in this special issue or not on account of the space limitations.  ... 
doi:10.1155/2013/565076 fatcat:bzpnohxzkbhunbkiuseo3m4yqu

Anonymity Preserving Routing In Location Privacy Schemes In Wireless Sensor Networks

R Regin
2015 International Journal of Research and Innovations in Science and Technology  
The locations of sinks can be protected from a local eavesdropper by hashing the ID field in the packet header.  ...  Besides protection some source nodes are transferring relatively large amounts of data in existing system.  ...  Sink-location privacy The locations of sinks can be protected from a local eavesdropper by hashing the ID field in the packet header.  ... 
doaj:0168608070ac46e59b4b963ebf61db48 fatcat:s3xhoagukjdareztknkcrimqj4

A New Secure Strategy for Small-Scale IEEE 802.11 Wireless Local Area Networ

Huiting Liu, Hua Zhang, Weilin Xu, Yigang Yang
2012 International Journal of Wireless and Microwave Technologies  
The new secure strategy is based on web authentication with unshared key and virtual local area network (VLAN) in wireless network.  ...  Then we propose a new strategy for small-scale IEEE 802.11 wireless local area network which can strengthen the network security.  ...  Here, we propose a new strategy based on web authentication with unshared key and virtual local area network (VLAN) in wireless network.  ... 
doi:10.5815/ijwmt.2012.04.04 fatcat:qf45m33tzjfuvo5jifi6dbjf44

Physical Layer Attacks on Unlinkability in Wireless LANs [chapter]

Kevin Bauer, Damon McCoy, Ben Greenstein, Dirk Grunwald, Douglas Sicker
2009 Lecture Notes in Computer Science  
Recent work has focused on hiding explicit network identifiers such as hardware addresses from the link layer to enable anonymous communications in wireless LANs.  ...  These protocols encrypt entire wireless packets, thereby providing unlinkability.  ...  Anonymity in wireless networks. Several strategies have been proposed to address the leakage of identifying information within wireless networks.  ... 
doi:10.1007/978-3-642-03168-7_7 fatcat:ecqr4rpzibcaxkq7boz4hdorji
« Previous Showing results 1 — 15 out of 1,329 results